Blog

Data security

Use Smartphones Only in Emergencies – Government Instructs Ministries to Avoid Loss of Sensitive National Data

  • 36
    Shares
 June 6, 2016
smartphone security

Estimated reading time: 2 minutes

Just like the private sector, the Government has been encouraging its employees to use smartphones for better collaboration within departments. This rapid adoption of smartphones and Internet services in Government organizations might lead to situations where national security could be compromised by a simple data breach. This is a concern...

Security Habits to Break and Make in 2016

 January 5, 2016

Estimated reading time: 2 minutes

Here we are in a New Year with all new resolutions and promises. While we keep some, we often tend to break many. Quick Heal will always advise you to work on your promises. Every year, Quick Heal promises to come up with better and updated versions of security solutions...

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
 December 4, 2015

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...

WhatsApp and Google Drive Integration Just Around the Corner

 October 9, 2015

Estimated reading time: 2 minutes

Losing a phone is never a pleasant experience, especially with the amount of data that is actually present on people’s smartphones today. Phone loss through theft or carelessness can be an expensive matter, and this is compounded further by all the information that is one the phone, amongst other things....

A Guide to Data Leakage and How Data Loss Prevention (DLP) Tools Help

 August 13, 2014

Estimated reading time: 4 minutes

Data Loss Prevention (DLP) is one of the most hyped up and discussed, but least understood enterprise security tools for companies that wish to safeguard the confidentiality of their data. While many assume that data loss is a minor inconvenience that is associated with the simple loss of crucial devices...

6 Easy Methods to Prevent Identity Theft

 July 16, 2014

Estimated reading time: 3 minutes

Everyone who works on the Internet today has an identity online and in many ways, this identity is what defines them in the virtual and cyber world. Many times though, malicious parties and hackers actively carry out what is known as identity theft and this can be highly debilitating for...

China condemns the iPhone and other IT security news

 July 12, 2014

Estimated reading time: 2 minutes

Here is a quick look into the IT security news and industry relevant stories from the week gone by. Hybrid future of data is imminent With data security and privacy as high as ever, Gartner has boldly predicted that the physical location of data is becoming increasingly irrelevant. Instead, what...

Why a Simple Antivirus Isn’t Enough for Small and Midsize Businesses

 December 19, 2013

Estimated reading time: 2 minutes

Let’s make peace with the fact that if there is anything that small and midsize businesses are lax about is their IT security. And this what cyber crooks are good at capitalizing at. Instead of burning their energy into taking down big businesses (which general have good IT security defense...